Security Attacks Flashcards

1
Q

Define DDoS Attacks

A

Distributed Denial of Service Attacks, destroy utility of a network or resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Advance-Fee Fraud

A

You pay for something without asking a cast-iron guarantee in place of a return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Phishing

A

Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware using messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Pharming

A

A cyberattack intended to redirect to a fake website to obtain personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Ransomware

A

Malicious application of encryption technology - once installed on a target computer it encrypts the hardware, locking away all information stored there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Social Engineering

A

The psychological manipulation of people into performing actions or divulging confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of basic social engineering attacks

A

Spear Phishing, Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are phases in the Social Engineering Life Cycle

A

Investigation, Hook, Play, Exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Investigation

A

Preparing the ground for attack; identifying the victim(s), Gathering background information, Selecting attack method(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Hook

A

Deceiving the victim(s) to gain a foothold; Engaging the target, Spinning a story, Taking control of the interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Play

A

Obtaining the information over a period of time; Expanding foothold, Executing the attack, Disrupting business or/and siphoning data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Exit

A

Closing the interaction; Removing all traces of malware, Covering tracks, Bringing the charade to a natural end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly